Mining and Detecting Connection-Chains in Network Traffic

Size: px
Start display at page:

Download "Mining and Detecting Connection-Chains in Network Traffic"

Transcription

1 Mining and Detecting Connection-Chains in Network Traffic Ahmad Almulhem and Issa Traore ISOT Research Lab, ECE Department, University of Victoria, Victoria, CANADA Summary. A connection-chain refers to the set of connections created by sequentially logging into a series of hosts. Attackers typically use connection chains to indirectly carry their attacks and stay anonymous. In this paper, we proposed a host-based algorithm to detect connection chains by passively monitoring inbound and outbound packets. In particular, we employ concepts from association rule mining in the data mining literature. The proposed approach is first explained in details. We then present our evaluations of the approach in terms of real-time and detection performance. Our experimentations suggest that the algorithm is suitable for real-time operation, because the average processing time per packet is both constant and low. We also show that by appropriately setting underlying parameters we can achieve perfect detection. Key words: Connection chain, Stepping stone, Tracing, Traceback, Network forensics, Network security 1 Introduction In order to provide a stronger level of security, most organizations use a mixture of various technologies such as firewalls and intrusion detection systems. Conceptually, those technologies address security from three perspectives; namely prevention, detection, and reaction. We, however, believe that a very important piece is missing from this model. Specifically, current technologies lack any investigative features. In the event of attacks, it is extremely hard to tie the ends and come up with a thorough analysis of how the attack happened and what the steps were. We believe the solution is in the realm of Network Forensics; a dedicated investigation technology that allows for the capture, recording and analysis of network events for investigative purposes [1]. The current practice in investigating network security incidents is a manual and brute-force approach. Experienced system administrators generally conduct

2 2 Ahmad Almulhem and Issa Traore it. Typically, investigation proceeds by processing various types of logs, which are located in a number of places. Brute force investigation however is a time consuming and error-prone process. It also can be challenging because the mentioned logs are not meant for thorough investigation. The logs may lack enough details or contrarily have lots of unrelated details. In this regard developing investigative tools that can assist and automate network forensics process is essential. In this paper, we present the foundation of a data mining tool that can assist network forensics analyst in automatically detecting connection-chains in network traffic data, which represent an important but challenging aspect of network forensics. The term connection-chain refers to the set of connections created by sequentially logging into a series of hosts, known as stepping-stones [2, 3]. Attackers typically use connection chains to indirectly carry their attacks and stay anonymous. As such, several approaches have been proposed in the literature to detect them. We refer the interested reader to our review paper for a taxonomy and a detailed discussion of these approaches [4]. In this paper, we propose a host-based technique to detect connectionchains. In general, the main disadvantage of the host-based approaches proposed so far in the literature is that they are operating system specific [5, 6, 7]. Specifically, they are expected to be re-designed and re-implemented differently for different operating system. Also, it is not obvious if they can be applied to proprietary operating systems such as MS Windows. To avoid being operating system specific, we adopt a black-box approach. In essence, inbound and outbound packets at a host are passively monitored to detect if there is a connection-chain. In particular, we employ concepts from association-rule mining from the data mining literature. Agrawal et al. were first to introduce association rules mining concepts, and demonstrate their usefulness in analyzing a database of sales transactions (market basket transactions) [8]. The rest of the paper is organized as follows. In section 2, we summarize and discuss related work on host-based approaches for connection-chains detection. In section 3, we give some background knowledge on association rule mining. In section 4, we present our detection framework by presenting our connection-chain mining approach and algorithm. In section 5, we describe the experimental evaluation of the proposed approach, and present and discuss the obtained performance results. Finally, in section 6, we make some concluding remarks. 2 Related Work Several host-based detection techniques have been proposed in the literature. They can be broadly classified into two main classes. In the first class, processes at the concerned host are searched to find out if two connections are part of a connection chain [6, 7]. The idea is that if an outbound connection

3 Mining and Detecting Connection-Chains in Network Traffic 3 is created by an inbound one, then their corresponding processes should be related. The main concern in this approach is that the search process may fail if the link is involved. For instance, this can be the case when the related processes are created through deeply nested pipes. In the second class, an operating system itself is modified to support linking an outbound connection to an inbound one. Buchholz and Shields proposed special data structures and system calls to achieve the desired linking [5]. In particular, for each process, a new data structure origin is stored in its process table. For processes created by a remote connection, origin holds the typical 5-tuple information associated with that connection. For locally created processes, origin is undefined. When a process forks another one, origin is as usual inherited. The main concern in this approach is that modifying an operating system can be costly and might break already running software. 3 Background 3.1 Association Rules Mining In the data mining field, association rules mining refers to a methodology that is used to discover interesting relationships in large data sets [9]. Specifically, the term association rules is used to denote the discovered relationships, while the process itself is called mining for association rules. Formally, let I = {i 1, i 2,..., i n } be a set of items. Let T = {t 1, t 2,...,t N } be a set of transactions, where each transaction t i contains a subset of items from I, i.e. t i I. An itemset is also defined as a set of items. An association rule is an implication of the form X Y, where X and Y are disjoint itemsets, i.e. X Y = φ. The strength of an association rule is typically measured by its support (s) and confidence (c). The support implies that X and Y occur together in s% of the total transactions. On the other hand, the confidence implies that, of all the transactions containing X, c% also contain Y. 3.2 Connection Chains A connection chain denotes a set of tcp connections [10], which are formed when one logs into one host, from there logs into another and so on. From a host perspective, a connection chain appears as a pair of connections through which packets flow back and forth. An important observation is that the time taken by packets inside the host has to be bounded for a connection chain to work [11]. Throughout this paper, we refer to this time bound as. Furthermore, a connection between two hosts is a bidirectional channel that enables both ends to send and receive data. For convenience, we refer to each channel as a flow. Further, an inbound flow refers to the flow of traffic from a remote host to the local host, while an outbound flow refers to the

4 4 Ahmad Almulhem and Issa Traore reverse direction. Similarly, inbound and outbound packets refer to packets in the corresponding flow. 4 Connection-Chains Detection 4.1 Connection-Chains Mining Approach We adapt the traditional association rule mining framework, which originally was geared toward business transactions rules mining, for connection chains mining. In our approach, the items of interest correspond to a set of connections, and the desired association rules correspond to connection chains. Formally, let C = {c 1, c 2,..., c n } be the set of active connections at a given host. As packets flow in these connections, transactions are dynamically generated. For a given packet, transactions are restricted to be one of the following two types: input transaction [c i ], where c i C, or chain transaction [c i, c j ], where [c i, c j ] = [c j, c i ], c i c j and c i, c j C. An input transaction [c i ] is generated when an inbound packet is received on the corresponding connection. On the other hand, a chain transaction [c i, c j ] is generated when an outbound packet in one connection follows an inbound packet in the other connection within a amount of time. For a transaction of type [.], the support count σ([.]) refers to how many times it has occurred. A connection-chain is an association rule of the form {c i, c j }, with its confidence defined as follows: confidence({c i, c j }) = σ([c i, c j ]) σ([c i ]) + σ([c j ]) where c i c j and c i, c j C. Note that a set notation is used to represent a connection chain instead of an implication ( ), in order to emphasize the fact that a connection chain does not imply a particular direction. Intuitively, the numerator of the confidence is a count of how many times a chain transaction has occurred; i.e. packets flow within time unit in either directions: c i c j or c j c i. The denominator represents a count of how may times an input packet is seen on the corresponding connection. Typically, a true connection chain is expected to have a high confidence close to 1, while a false one is expected to have a low confidence close 0. (1) 4.2 Detection Algorithm In figure 1, we summarize the detection algorithm as a pseudo-code. The input to the algorithm is a stream of packets P, which is either captured in real-time

5 Mining and Detecting Connection-Chains in Network Traffic 5 1: INPUT: P a stream of packets 2: inboundpackets = {} 3: for all p P do 4: if d(p) = in then 5: generate an [c(p)] transaction 6: add p to inboundpackets 7: else if d(p) = out then 8: for all q inboundpackets do 9: if t(p) t(q) then 10: if c(p) c(q) then 11: generate an [c(p), c(q)] transaction 12: end if 13: else 14: remove q from inboundpackets 15: end if 16: end for 17: end if 18: end for Fig. 1. The detection algorithm. or read from a saved capture file. Those packets are processed in the order of their timestamps. For each packet p P, we define the following operators : t(p) : the time-stamp of p. c(p) : the connection to which p belongs. d(p) : the direction of p; either inbound (in) or outbound (out). When the processed packet p is an inbound one, an input transaction of type [c(p)] is generated. Also, the packet itself is added to the inboundp ackets set for later comparisons with outbound packets. On the other hand, the processing of an outbound packet p is more involved. The packet is compared with all inbound packets that were stored in inboundp ackets set. Then, a chain transaction is generated of type [c(p), c(q)], if q inboundpackets, t(p) t(q) and c(p) c(q). Although not shown in figure 1, support counts of the generated transactions are maintained in a special data structure. Then, the confidences are computed according to equation 1. Particularly, connection chains corresponds to any pair of connections with a confidence exceeding some userdefined threshold (minconf ). 5 Experiments 5.1 Experimental Settings We implemented the proposed approach in Java, and run various experimentations on a PC with the following specifications: a 1.3Ghz Intel Pentium

6 6 Ahmad Almulhem and Issa Traore m-processor, 2 GB RAM, and 80 GB 7200 RPM Hard drive. The experimentations were performed using a public network trace (LBNL-FTP-PKT) [12]. It was selected because it is reasonably large to assess the algorithm. Also, it only contains the interactive part (control stream) of FTP sessions. This means that the characteristics of the traffic in this trace is similar to those generated by applications such as telnet [13] and ssh [14] that are used in creating connection chains. The trace contains a ten-day worth of traffic for the period of Jan 10-19, It contains 3.2 million packets flowing in 22 thousand connections. The connections are between 320 distinct FTP servers and 5832 distinct clients. Initially, we sliced the trace into 320 subtraces using the servers ip addresses; i.e. each subtrace contains the packets exchanged with the corresponding server. In a way, running the algorithm on a subtrace is equivalent to running the algorithm in real-time on the corresponding server. In the experimentations, we studied the effect of changing. As such, we first analyzed the timing of inbound and outbound packets of those servers, and estimated the response time of the servers to be between msec. We used this value as a guidance to set in our test suite. Accordingly, we decided to use the following values of : 1, 10, 50, 100, 200, and 500 msec. They were selected to investigate the effect of setting, below, around, and above the true value. 5.2 Real-Time Performance To assess the algorithm s real-time performance, we evaluated the processing time per packet. For every subtrace (320 subtraces), we run the algorithm with a of 1, 10, 50, 100, 200, and 500 msec; i.e. a total of = 1920 cases. For a particular subtrace S i, the processing time T i is recorded in each case. The results are then plotted in figure 2. As shown in figure 2, we notice that the processing time exhibits a linear trend as subtraces increase in size. Accordingly, the processing time per packet is almost constant, as it basically corresponds to the slope of these lines. Mathematically, it is given by Ti S i seconds/packet, where S i is the number of packets. For this trace, the average processing time per packet is approximately 35 µsec/packet. Additionally, we noticed that varying does not seem to have a significant effect on the processing time. Accordingly, we concluded that the algorithm is suitable for real-time operation, because the average processing time per packet is both constant and low. 5.3 Detection Performance To assess the detection performance of the algorithm, we first picked the largest subtrace among the 320 subtraces, although other subtraces give similar results. The subtrace contains 1.7 millions packets that correspond to the traffic exchanged between the server ( ) and 236 unique remote

7 Mining and Detecting Connection-Chains in Network Traffic msec 10 msec 50 msec 100 msec 200 msec 500 msec processing tim e (seconds ) no. of packet s x 10 5 Fig. 2. The processing time of the 320 subtraces for different values of. The subtraces are sorted in increasing order according to the number of packets. As shown, the processing time is approximately linear as subtraces increase in size. hosts. Among these 236 unique remote addresses, we randomly picked 88 of them to create simulated connection chains as follows. Let L, R and R respectively stand for the server (local), a remote host and a fictitious remote host. Then, the steps to create a simulated connection chain {R,R } are as follows: For an inbound packet (R,L), create an outbound packet (L,R ). The timestamp of the new packet is set to original time-stamp plus some random time t. For an outbound packet (L,R), create an inbound packet (R,L). The timestamp of the new packet is set to original time-stamp minus some random time t. Merge those generated packets into the original trace. For the random time t, we use a uniform random variable between msec (an estimate of the server response time). Accordingly, the modified

8 8 Ahmad Almulhem and Issa Traore subtrace has = 324 remote addresses and ( ) = possible connection chains. Only 88 out of the possible connection chains are true connection chains ( 0.2% ). Those are the ones that we actually simulated. The modified subtrace is then used as an input to the algorithm. In order to study all connection chains detected by the algorithm regardless of their confidences, we compute confidence statistics for different values of. The following values of were considered: 1, 10, 50, 100, 200, and 500 msec. Note that a of 100 msec is the ideal value in this case, because the server response time is estimated to be msec. Table 1. A summary of The Algorithm s output showing confidence statistics for different values of under any non negative value for minconf. Confidence Min 1st Quartile Median Mean 3rd Quartile Max = 1 ms = 10 ms = 50 ms True False True False True False = 100 ms = 200 ms = 500 ms True False True False True False A summary of the the algorithm s output is shown in table 1. For each value of, we list several descriptive statistical quantities to show the confidences distributions of the true and false connection chains involved in the evaluation dataset. We visualize the confidences of true and false connection chains in figure 3. In this figure, notice how the confidences of true and false connection chains overlap when is set to very low values (1 and 10 msec). However, once is set around or above the ideal value, true connection chains are clearly separated. In this case, by appropriately setting the confidence threshold (minconf) in the separation area, we achieve perfect detection rates. For instance, for = 100 msec, by setting minconf = 0.5 we obtain a true detec-

9 Mining and Detecting Connection-Chains in Network Traffic (msec) Confidence Fig. 3. The range (min-max) of confidences of true and false connection chains for different values of. For each value of, a grey region indicates the range for false connection chains, while a black region indicates the range for true ones. tion rate = 100% and false detection rate = 0%. Also, notice that increasing beyond the ideal value decreases the separation between the confidences of the true and false connection chains. In this case, the maximum separation occurs at the ideal value of (100 msec). However, notice that this separation is reasonably large even when = 500 msec; i.e. 5 times the ideal value. In essence, large separation is desirable because it gives greater flexibility in setting the minconf threshold. Such threshold is used to reduce (or eliminate) false connection chains. 6 Concluding Remarks A connection-chain refers to the set of connections created by sequentially logging into a series of hosts. Attackers typically use connection chains to indirectly carry their attacks and stay anonymous. In this paper, we proposed

10 10 Ahmad Almulhem and Issa Traore a host-based algorithm to detect connection chains by passively monitoring inbound and outbound packets. We took advantage of the fact that the time taken by a packet inside the host has to be bounded for a connection chain to work. We refer to this time bound as. In the proposed approach, we employed concepts from association rule mining in the data mining literature. In particular, we proposed efficient algorithm to discover connection chains among a set of connections. Also, a confidence measure is proposed to measure the strength of a connection chain. We implemented the proposed approach in Java, and run various experimentations to assess the real-time and detection performance. The experimentations were performed using a public network trace. For processing time, our experimentations suggest that the algorithm is suitable for real-time operation, because the average processing time per packet is both constant and low. For the detection performance, our experimentations suggest that the algorithm is effective in detecting true connection chains. The setting of seems to play an important role. In particular, we found that the confidences of true and false connection chains are clearly separated when is set around or above (even 5 times) the true value. This gives greater flexibility in setting a confidence threshold (minconf) to reduce (or eliminate) false connection chains. References 1. M. Ranum, Network forensics: Network traffic monitoring, Network Flight Recorder, Inc., Tech. Rep., S. Staniford-Chen and L. T. Heberlein, Holding intruders accountable on the internet, in Proceedings of IEEE Symposium on Security and Privacy, May 1995, pp Y. Zhang and V. Paxson, Detecting stepping stones, in 9th USENIX Security Symposium, Aug 2000, pp A. Almulhem and I. Traore, Connection-chains: A review and taxonomy, ECE Department, University of Victoria, Tech. Rep. ECE-05.4, F. Buchholz and C. Shields, Providing process origin information to aid in network traceback, in Proceedings of the 2002 USENIX Annual Technical Conference, B. Carrier and C. Shields, The session token protocol for forensics and traceback, ACM Trans. Inf. Syst. Secur., vol. 7, no. 3, pp , H. W. Kang, S. J. Hong, and D. H. Lee, Matching connection pairs, in Lecture Notes in Computer Science, vol. 3320, Jan 2004, pp R. Agrawal, T. Imielinski, and A. Swami, Mining association rules between sets of items in large databases, SIGMOD Rec., vol. 22, no. 2, pp , P.-N. Tan, M. Steinbach, and V. Kumar, Introduction to Data Mining. Addison- Wesley, J. Postel, Transmission Control Protocol, RFC 793, sep 1981.

11 Mining and Detecting Connection-Chains in Network Traffic D. L. Donoho, A. G. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford, Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay, in RAID 2002: Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection,, october 2002, pp Lbnl-ftp-pkt, J. Postel and J. Reynolds, Telnet Protocol Specification, RFC 854, May C. Lonvick, SSH Protocol Architecture, Cisco Systems, Inc., December 2004.

Traffic Analysis. Scott E. Coull RedJack, LLC. Silver Spring, MD USA. Side-channel attack, information theory, cryptanalysis, covert channel analysis

Traffic Analysis. Scott E. Coull RedJack, LLC. Silver Spring, MD USA. Side-channel attack, information theory, cryptanalysis, covert channel analysis Traffic Analysis Scott E. Coull RedJack, LLC. Silver Spring, MD USA Related Concepts and Keywords Side-channel attack, information theory, cryptanalysis, covert channel analysis Definition Traffic analysis

More information

Correlated Network Flows Detection

Correlated Network Flows Detection Correlated Network Flows Detection Olga Birth Betreuer: Michael Herrmann Hauptseminar- Innovative Internettechnologien und Mobilkommunikation SS2011 Lehrstuhl Netzarchitekturen und Netzdienste Fakultät

More information

On A Network Forensics Model For Information Security

On A Network Forensics Model For Information Security On A Network Forensics Model For Information Security Ren Wei School of Information, Zhongnan University of Economics and Law, Wuhan, 430064 renw@public.wh.hb.cn Abstract: The employment of a patchwork

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

An apparatus for P2P classification in Netflow traces

An apparatus for P2P classification in Netflow traces An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA

More information

Recap: Tracking Anonymous Peer-to- Peer VoIP Calls on the Internet. Scott E. Coull and Amos Wetherbee April 7, 2006

Recap: Tracking Anonymous Peer-to- Peer VoIP Calls on the Internet. Scott E. Coull and Amos Wetherbee April 7, 2006 Recap: Tracking Anonymous Peer-to- Peer VoIP Calls on the Internet Scott E. Coull and Amos Wetherbee April 7, 2006 Encoding a bit 1. Packet flow of n bits 2. Select 2r packets from the first n-d packets

More information

Security Event Management. February 7, 2007 (Revision 5)

Security Event Management. February 7, 2007 (Revision 5) Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST

More information

Network Intrusion Simulation Using OPNET

Network Intrusion Simulation Using OPNET Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School of Electrical Engineering & Computer Science and National Center for Forensic Science* University of Central Florida,

More information

Online Identification of Multi-Attribute High-Volume Traffic Aggregates Through Sampling

Online Identification of Multi-Attribute High-Volume Traffic Aggregates Through Sampling Online Identification of Multi-Attribute High-Volume Traffic Aggregates Through Sampling Yong Tang Shigang Chen Department of Computer & Information Science & Engineering University of Florida, Gainesville,

More information

Detection of Distributed Denial of Service Attack with Hadoop on Live Network

Detection of Distributed Denial of Service Attack with Hadoop on Live Network Detection of Distributed Denial of Service Attack with Hadoop on Live Network Suchita Korad 1, Shubhada Kadam 2, Prajakta Deore 3, Madhuri Jadhav 4, Prof.Rahul Patil 5 Students, Dept. of Computer, PCCOE,

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

Introduction of Intrusion Detection Systems

Introduction of Intrusion Detection Systems Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:

More information

Preventing Denial-of-request Inference Attacks in Location-sharing Services

Preventing Denial-of-request Inference Attacks in Location-sharing Services Preventing Denial-of-request Inference Attacks in Location-sharing Services Kazuhiro Minami Institute of Statistical Mathematics, Tokyo, Japan Email: kminami@ism.ac.jp Abstract Location-sharing services

More information

Transformation of honeypot raw data into structured data

Transformation of honeypot raw data into structured data Transformation of honeypot raw data into structured data 1 Majed SANAN, Mahmoud RAMMAL 2,Wassim RAMMAL 3 1 Lebanese University, Faculty of Sciences. 2 Lebanese University, Director of center of Research

More information

Multi-level Metadata Management Scheme for Cloud Storage System

Multi-level Metadata Management Scheme for Cloud Storage System , pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1

More information

Research on Errors of Utilized Bandwidth Measured by NetFlow

Research on Errors of Utilized Bandwidth Measured by NetFlow Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic

More information

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more

More information

Signature-aware Traffic Monitoring with IPFIX 1

Signature-aware Traffic Monitoring with IPFIX 1 Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764

More information

POX CONTROLLER PERFORMANCE FOR OPENFLOW NETWORKS. Selçuk Yazar, Erdem Uçar POX CONTROLLER ЗА OPENFLOW ПЛАТФОРМА. Селчук Язар, Ердем Учар

POX CONTROLLER PERFORMANCE FOR OPENFLOW NETWORKS. Selçuk Yazar, Erdem Uçar POX CONTROLLER ЗА OPENFLOW ПЛАТФОРМА. Селчук Язар, Ердем Учар УПРАВЛЕНИЕ И ОБРАЗОВАНИЕ MANAGEMENT AND EDUCATION TOM IX (6) 2013 VOL. IX (6) 2013 POX CONTROLLER PERFORMANCE FOR OPENFLOW NETWORKS Selçuk Yazar, Erdem Uçar POX CONTROLLER ЗА OPENFLOW ПЛАТФОРМА Селчук

More information

An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework

An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework Jakrarin Therdphapiyanak Dept. of Computer Engineering Chulalongkorn University

More information

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor -0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University

More information

How To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On

How To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On Michel Laterman We have a monitor set up that receives a mirror from the edge routers Monitor uses an ENDACE DAG 8.1SX card (10Gbps) & Bro to record connection level info about network usage Can t simply

More information

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. prashil.waghmare14@gmail.com

More information

Network Performance Monitoring at Small Time Scales

Network Performance Monitoring at Small Time Scales Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA dina@sprintlabs.com Electrical and Computer Engineering Department University

More information

Network Intrusion Detection Systems

Network Intrusion Detection Systems Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection

More information

A Frequency-Based Approach to Intrusion Detection

A Frequency-Based Approach to Intrusion Detection A Frequency-Based Approach to Intrusion Detection Mian Zhou and Sheau-Dong Lang School of Electrical Engineering & Computer Science and National Center for Forensic Science, University of Central Florida,

More information

A Quality of Service Monitoring System for Service Level Agreement Verification

A Quality of Service Monitoring System for Service Level Agreement Verification A Quality of Service Monitoring System for Service Level Agreement Verification Xiaoyuan Ta A thesis submitted in fulfilment of the requirements for the award of the degree of MASTER OF ENGINEERING BY

More information

Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently.

Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently. TLP:WHITE - Port Evolution Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently. Gerard Wagener 41, avenue de la Gare L-1611 Luxembourg Grand-Duchy

More information

Flow-based detection of RDP brute-force attacks

Flow-based detection of RDP brute-force attacks Flow-based detection of RDP brute-force attacks Martin Vizváry vizvary@ics.muni.cz Institute of Computer Science Masaryk University Brno, Czech Republic Jan Vykopal vykopal@ics.muni.cz Institute of Computer

More information

Network Based Intrusion Detection Using Honey pot Deception

Network Based Intrusion Detection Using Honey pot Deception Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.

More information

NVisionIP: An Interactive Network Flow Visualization Tool for Security

NVisionIP: An Interactive Network Flow Visualization Tool for Security NVisionIP: An Interactive Network Flow Visualization Tool for Security Kiran Lakkaraju William Yurcik Ratna Bearavolu Adam J. Lee National Center for Supercomputing Applications (NCSA) University of Illinois,

More information

Conclusions and Future Directions

Conclusions and Future Directions Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions

More information

Advanced Honeypot System for Analysing Network Security

Advanced Honeypot System for Analysing Network Security ISSN: 2347-3215 Volume 2 Number 4 (April-2014) pp. 65-70 www.ijcrar.com Advanced Honeypot System for Analysing Network Security Suruchi Narote 1* and Sandeep Khanna 2 1 Department of Computer Engineering.

More information

A Real-Time Network Traffic Based Worm Detection System for Enterprise Networks

A Real-Time Network Traffic Based Worm Detection System for Enterprise Networks A Real-Time Network Traffic Based Worm Detection System for Enterprise Networks Long-Quan Zhao 1, Seong-Chul Hong 1, Hong-Taek Ju 2 and James Won-Ki Hong 1 1 Dept. of Computer Science and Engineering,

More information

Application of Data Mining Techniques in Intrusion Detection

Application of Data Mining Techniques in Intrusion Detection Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology leiminxuan@sohu.com Abstract: The article introduced the importance of intrusion detection, as well as

More information

Attack graph analysis using parallel algorithm

Attack graph analysis using parallel algorithm Attack graph analysis using parallel algorithm Dr. Jamali Mohammad (m.jamali@yahoo.com) Ashraf Vahid, MA student of computer software, Shabestar Azad University (vahid.ashraf@yahoo.com) Ashraf Vida, MA

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PACKET SNIFFING MS. SONALI A. KARALE 1, MS. PUNAM P. HARKUT 2 HVPM COET Amravati.

More information

HMM Profiles for Network Traffic Classification

HMM Profiles for Network Traffic Classification HMM Profiles for Network Traffic Classification Charles Wright, Fabian Monrose and Gerald Masson Johns Hopkins University Information Security Institute Baltimore, MD 21218 Overview Problem Description

More information

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,

More information

Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm

Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm R. Sridevi et al Int. Journal of Engineering Research and Applications RESEARCH ARTICLE OPEN ACCESS Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm R. Sridevi,*

More information

BRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS

BRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS GESJ: Computer Science and Telecommunications 21 No.3(26) BRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS Said Fathy El-Zoghdy Department of Computer Science,

More information

KEITH LEHNERT AND ERIC FRIEDRICH

KEITH LEHNERT AND ERIC FRIEDRICH MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They

More information

ANALYZING NETWORK TRAFFIC FOR MALICIOUS ACTIVITY

ANALYZING NETWORK TRAFFIC FOR MALICIOUS ACTIVITY CANADIAN APPLIED MATHEMATICS QUARTERLY Volume 12, Number 4, Winter 2004 ANALYZING NETWORK TRAFFIC FOR MALICIOUS ACTIVITY SURREY KIM, 1 SONG LI, 2 HONGWEI LONG 3 AND RANDALL PYKE Based on work carried out

More information

A Survey on Association Rule Mining in Market Basket Analysis

A Survey on Association Rule Mining in Market Basket Analysis International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 409-414 International Research Publications House http://www. irphouse.com /ijict.htm A Survey

More information

Second-generation (GenII) honeypots

Second-generation (GenII) honeypots Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. b.zdrnja@auckland.ac.nz Abstract Honeypots are security resources which trap malicious activities, so they

More information

Daryl Ashley Senior Network Security Analyst University of Texas at Austin - Information Security Office ashley@infosec.utexas.edu January 12, 2011

Daryl Ashley Senior Network Security Analyst University of Texas at Austin - Information Security Office ashley@infosec.utexas.edu January 12, 2011 AN ALGORITHM FOR HTTP BOT DETECTION Daryl Ashley Senior Network Security Analyst University of Texas at Austin - Information Security Office ashley@infosec.utexas.edu January 12, 2011 Introduction In the

More information

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.

More information

Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems

Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems

More information

Firewalls and intrusion detection systems

Firewalls and intrusion detection systems Firewalls and intrusion detection systems Markus Peuhkuri 2005-03-22 Lecture topics Firewalls Security model with firewalls Intrusion detection systems Intrusion prevention systems How to prevent and detect

More information

A Novel Approach for Network Traffic Summarization

A Novel Approach for Network Traffic Summarization A Novel Approach for Network Traffic Summarization Mohiuddin Ahmed, Abdun Naser Mahmood, Michael J. Maher School of Engineering and Information Technology, UNSW Canberra, ACT 2600, Australia, Mohiuddin.Ahmed@student.unsw.edu.au,A.Mahmood@unsw.edu.au,M.Maher@unsw.

More information

Robust Quick String Matching Algorithm for Network Security

Robust Quick String Matching Algorithm for Network Security 18 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.7B, July 26 Robust Quick String Matching Algorithm for Network Security Jianming Yu, 1,2 and Yibo Xue, 2,3 1 Department

More information

A Visualization Technique for Monitoring of Network Flow Data

A Visualization Technique for Monitoring of Network Flow Data A Visualization Technique for Monitoring of Network Flow Data Manami KIKUCHI Ochanomizu University Graduate School of Humanitics and Sciences Otsuka 2-1-1, Bunkyo-ku, Tokyo, JAPAPN manami@itolab.is.ocha.ac.jp

More information

An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation

An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation Shanofer. S Master of Engineering, Department of Computer Science and Engineering, Veerammal Engineering College,

More information

HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b

HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b Advanced Engineering Forum Online: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 991-994 doi:10.4028/www.scientific.net/aef.6-7.991 2012 Trans Tech Publications, Switzerland HIDS and NIDS Hybrid Intrusion

More information

Load Balancing and Switch Scheduling

Load Balancing and Switch Scheduling EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: liuxh@systems.stanford.edu Abstract Load

More information

A FRAMEWORK FOR AN ADAPTIVE INTRUSION DETECTION SYSTEM WITH DATA MINING. Mahmood Hossain and Susan M. Bridges

A FRAMEWORK FOR AN ADAPTIVE INTRUSION DETECTION SYSTEM WITH DATA MINING. Mahmood Hossain and Susan M. Bridges A FRAMEWORK FOR AN ADAPTIVE INTRUSION DETECTION SYSTEM WITH DATA MINING Mahmood Hossain and Susan M. Bridges Department of Computer Science Mississippi State University, MS 39762, USA E-mail: {mahmood,

More information

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24 Introduction to Computer Networks Lecture24 Network security (continued) Key distribution Secure Shell Overview Authentication Practical issues Firewalls Denial of Service Attacks Definition Examples Key

More information

A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification

A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification Riyad Alshammari and A. Nur Zincir-Heywood Dalhousie University, Faculty of Computer Science {riyad, zincir}@cs.dal.ca

More information

ECE 578 Term Paper Network Security through IP packet Filtering

ECE 578 Term Paper Network Security through IP packet Filtering ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon

More information

New Matrix Approach to Improve Apriori Algorithm

New Matrix Approach to Improve Apriori Algorithm New Matrix Approach to Improve Apriori Algorithm A. Rehab H. Alwa, B. Anasuya V Patil Associate Prof., IT Faculty, Majan College-University College Muscat, Oman, rehab.alwan@majancolleg.edu.om Associate

More information

Influence of Load Balancing on Quality of Real Time Data Transmission*

Influence of Load Balancing on Quality of Real Time Data Transmission* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,

More information

Firewall Design Principles

Firewall Design Principles Firewall Design Principles Software Engineering 4C03 Dr. Krishnan Stephen Woodall, April 6 th, 2004 Firewall Design Principles Stephen Woodall Introduction A network security domain is a contiguous region

More information

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas

More information

How To Detect An Advanced Persistent Threat Through Big Data And Network Analysis

How To Detect An Advanced Persistent Threat Through Big Data And Network Analysis , pp.30-36 http://dx.doi.org/10.14257/astl.2013.29.06 Detection of Advanced Persistent Threat by Analyzing the Big Data Log Jisang Kim 1, Taejin Lee, Hyung-guen Kim, Haeryong Park KISA, Information Security

More information

An Overview of the Bro Intrusion Detection System

An Overview of the Bro Intrusion Detection System An Overview of the Bro Intrusion Detection System Brian L. Tierney, Vern Paxson, James Rothfuss Lawrence Berkeley National Laboratory Typical Approach: Firewall with default deny policy A blocking router

More information

Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation

Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Yu Gu, Andrew McCallum, Don Towsley Department of Computer Science, University of Massachusetts, Amherst, MA 01003 Abstract We develop

More information

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

How To Monitor And Test An Ethernet Network On A Computer Or Network Card 3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel

More information

A NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK

A NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK A NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK S.Veni 1 and Dr.G.M.Kadhar Nawaz 2 1 Research Scholar, Barathiar University, Coimbatore, India venii_k@yahoo.com 2 Director, Dept. of MCA, Sona College

More information

LCMON Network Traffic Analysis

LCMON Network Traffic Analysis LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia adamblack@swin.edu.au Abstract The Swinburne

More information

Energy aware RAID Configuration for Large Storage Systems

Energy aware RAID Configuration for Large Storage Systems Energy aware RAID Configuration for Large Storage Systems Norifumi Nishikawa norifumi@tkl.iis.u-tokyo.ac.jp Miyuki Nakano miyuki@tkl.iis.u-tokyo.ac.jp Masaru Kitsuregawa kitsure@tkl.iis.u-tokyo.ac.jp Abstract

More information

Efficiently Managing Firewall Conflicting Policies

Efficiently Managing Firewall Conflicting Policies Efficiently Managing Firewall Conflicting Policies 1 K.Raghavendra swamy, 2 B.Prashant 1 Final M Tech Student, 2 Associate professor, Dept of Computer Science and Engineering 12, Eluru College of Engineeering

More information

Cooperating Security Management for Mutually Trusted Secure Networks

Cooperating Security Management for Mutually Trusted Secure Networks Cooperating Security Management for Mutually Trusted Secure Networks Lai-Ming Shiue Department of Applied Mathematics National Chung-Hsing University Taichung 402, Taiwan Shang-Juh Kao Department of Computer

More information

How To Write A Privacy Preserving Firewall Optimization Protocol

How To Write A Privacy Preserving Firewall Optimization Protocol Asia-pacific Journal of Multimedia Services Convergence with Art, Humanities and Sociology Vol.1, No.2 (2011), pp. 93-100 http://dx.doi.org/10.14257/ajmscahs.2011.12.06 Secure Multi-Party Computation in

More information

Tackling Congestion to Address Distributed Denial of Service: A Push-Forward Mechanism

Tackling Congestion to Address Distributed Denial of Service: A Push-Forward Mechanism Tackling Congestion to Address Distributed Denial of Service: A Push-Forward Mechanism Srinivasan Krishnamoorthy and Partha Dasgupta Computer Science and Engineering Department Arizona State University

More information

A Method for Port Scanner Detection on a Mobile Network

A Method for Port Scanner Detection on a Mobile Network A Method for Port Scanner Detection on a Mobile etwork Sekwon Kim, Joohyung Oh, Inho Kim, and Chaetae Im Korea Internet Security Center Korea Internet & Security Agency IT Venture Tower, Jungdaero 135,

More information

Business Lead Generation for Online Real Estate Services: A Case Study

Business Lead Generation for Online Real Estate Services: A Case Study Business Lead Generation for Online Real Estate Services: A Case Study Md. Abdur Rahman, Xinghui Zhao, Maria Gabriella Mosquera, Qigang Gao and Vlado Keselj Faculty Of Computer Science Dalhousie University

More information

Load Distribution in Large Scale Network Monitoring Infrastructures

Load Distribution in Large Scale Network Monitoring Infrastructures Load Distribution in Large Scale Network Monitoring Infrastructures Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Gianluca Iannaccone, and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {jsanjuas,pbarlet,pareta}@ac.upc.edu

More information

Efficacy of Live DDoS Detection with Hadoop

Efficacy of Live DDoS Detection with Hadoop Efficacy of Live DDoS Detection with Hadoop Sufian Hameed IT Security Labs, NUCES, Pakistan Email: sufian.hameed@nu.edu.pk Usman Ali IT Security Labs, NUCES, Pakistan Email: k133023@nu.edu.pk Abstract

More information

An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus

An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus Tadashi Ogino* Okinawa National College of Technology, Okinawa, Japan. * Corresponding author. Email: ogino@okinawa-ct.ac.jp

More information

Examining How The Great Firewall Discovers Hidden Circumvention Servers

Examining How The Great Firewall Discovers Hidden Circumvention Servers Examining How The Great Firewall Discovers Hidden Circumvention Servers Roya Ensafi, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, and Vern Paxson Oct 29, 2015 1 Circumventing Internet

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop

Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill david.idol@unc.edu http://www.cs.unc.edu/~mxrider

More information

Implementation of Botcatch for Identifying Bot Infected Hosts

Implementation of Botcatch for Identifying Bot Infected Hosts Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus

More information

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,

More information

Monitoring for network security and management. Cyber Solutions Inc.

Monitoring for network security and management. Cyber Solutions Inc. Monitoring for network security and management Cyber Solutions Inc. Why monitoring? Health check of networked node Usage and load evaluation for optimizing the configuration Illegal access detection for

More information

Hadoop Technology for Flow Analysis of the Internet Traffic

Hadoop Technology for Flow Analysis of the Internet Traffic Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet

More information

Estimation of available bandwidth and measurement infrastructure for. Russian segment of Internet

Estimation of available bandwidth and measurement infrastructure for. Russian segment of Internet 1 Estimation of available bandwidth and measurement infrastructure for Abstracts Russian segment of Internet Platonov A.P. 1), Sidelnikov D.I. 2), Strizhov M.V. 3), Sukhov A.M. 4) 1) Russian Institute

More information

HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK

HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK 1 K.RANJITH SINGH 1 Dept. of Computer Science, Periyar University, TamilNadu, India 2 T.HEMA 2 Dept. of Computer Science, Periyar University,

More information

Data Mining Approach in Security Information and Event Management

Data Mining Approach in Security Information and Event Management Data Mining Approach in Security Information and Event Management Anita Rajendra Zope, Amarsinh Vidhate, and Naresh Harale Abstract This paper gives an overview of data mining field & security information

More information

Index Terms : Load rebalance, distributed file systems, clouds, movement cost, load imbalance, chunk.

Index Terms : Load rebalance, distributed file systems, clouds, movement cost, load imbalance, chunk. Load Rebalancing for Distributed File Systems in Clouds. Smita Salunkhe, S. S. Sannakki Department of Computer Science and Engineering KLS Gogte Institute of Technology, Belgaum, Karnataka, India Affiliated

More information

Identifying Market Price Levels using Differential Evolution

Identifying Market Price Levels using Differential Evolution Identifying Market Price Levels using Differential Evolution Michael Mayo University of Waikato, Hamilton, New Zealand mmayo@waikato.ac.nz WWW home page: http://www.cs.waikato.ac.nz/~mmayo/ Abstract. Evolutionary

More information

ECE 333: Introduction to Communication Networks Fall 2002

ECE 333: Introduction to Communication Networks Fall 2002 ECE 333: Introduction to Communication Networks Fall 2002 Lecture 14: Medium Access Control II Dynamic Channel Allocation Pure Aloha In the last lecture we began discussing medium access control protocols

More information

ACL Based Dynamic Network Reachability in Cross Domain

ACL Based Dynamic Network Reachability in Cross Domain South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer

More information

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network Fuzzy Active Management for Assured Forwarding Traffic in Differentiated Services Network E.S. Ng, K.K. Phang, T.C. Ling, L.Y. Por Department of Computer Systems & Technology Faculty of Computer Science

More information

Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints

Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Michael Bauer, Srinivasan Ravichandran University of Wisconsin-Madison Department of Computer Sciences {bauer, srini}@cs.wisc.edu

More information

DNA. White Paper. DNA White paper Version: 1.08 Release Date: 1 st July, 2015 Expiry Date: 31 st December, 2015. Ian Silvester DNA Manager.

DNA. White Paper. DNA White paper Version: 1.08 Release Date: 1 st July, 2015 Expiry Date: 31 st December, 2015. Ian Silvester DNA Manager. DNA White Paper Prepared by Ian Silvester DNA Manager Danwood Group Service Noble House Whisby Road Lincoln LN6 3DG Email: dna@danwood.com Website: www.danwood.com\dna BI portal: https:\\biportal.danwood.com

More information

Mining various patterns in sequential data in an SQL-like manner *

Mining various patterns in sequential data in an SQL-like manner * Mining various patterns in sequential data in an SQL-like manner * Marek Wojciechowski Poznan University of Technology, Institute of Computing Science, ul. Piotrowo 3a, 60-965 Poznan, Poland Marek.Wojciechowski@cs.put.poznan.pl

More information

Firewalls: The Next Generation. Rick Coloccia Network Manager coloccia@geneseo.edu

Firewalls: The Next Generation. Rick Coloccia Network Manager coloccia@geneseo.edu Firewalls: The Next Generation Rick Coloccia Network Manager coloccia@geneseo.edu Session Overview Evolution of the Firewall Packet Filters Stateful Firewalls Application Firewalls Single Appliance No

More information

Windows Remote Access

Windows Remote Access Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by

More information